1
0
mirror of https://github.com/moparisthebest/mail synced 2024-11-26 02:42:17 -05:00
mail/test/unit/crypto-test.js

121 lines
3.6 KiB
JavaScript
Raw Normal View History

2013-09-26 07:26:57 -04:00
define(['js/crypto/crypto', 'cryptoLib/util', 'test/test-data'], function(Crypto, util, testData) {
2013-06-10 17:07:29 -04:00
'use strict';
module("Crypto Api");
var cryptoTest = {
user: 'crypto_test@example.com',
password: 'Password',
keySize: 128,
ivSize: 128,
rsaKeySize: 1024,
salt: util.random(128)
2013-06-10 17:07:29 -04:00
};
2013-09-26 07:26:57 -04:00
var crypto;
2013-06-10 17:07:29 -04:00
asyncTest("Init without keypair", 4, function() {
2013-09-26 07:26:57 -04:00
crypto = new Crypto();
2013-06-10 17:07:29 -04:00
// init dependencies
ok(crypto, 'Crypto');
// test without passing keys
crypto.init({
emailAddress: cryptoTest.user,
password: cryptoTest.password,
salt: cryptoTest.salt,
2013-06-10 17:07:29 -04:00
keySize: cryptoTest.keySize,
rsaKeySize: cryptoTest.rsaKeySize
}, function(err, generatedKeypair) {
ok(!err && generatedKeypair, 'Init crypto without keypair input');
var pk = generatedKeypair.publicKey;
ok(pk._id && pk.userId, 'Key ID: ' + pk._id);
ok(pk.publicKey.indexOf('-----BEGIN PUBLIC KEY-----') === 0, pk.publicKey);
cryptoTest.generatedKeypair = generatedKeypair;
start();
});
});
2013-05-18 22:00:53 -04:00
2013-06-10 17:07:29 -04:00
asyncTest("Init with keypair", 1, function() {
// test with passing keypair
crypto.init({
emailAddress: cryptoTest.user,
password: cryptoTest.password,
salt: cryptoTest.salt,
2013-06-10 17:07:29 -04:00
keySize: cryptoTest.keySize,
rsaKeySize: cryptoTest.rsaKeySize,
storedKeypair: cryptoTest.generatedKeypair
}, function(err, generatedKeypair) {
ok(!err && !generatedKeypair, 'Init crypto with keypair input');
2013-05-14 06:57:09 -04:00
2013-06-10 17:07:29 -04:00
start();
});
2013-03-13 11:58:46 -04:00
});
2013-06-10 17:07:29 -04:00
asyncTest("PBKDF2 (Async/Worker)", 2, function() {
crypto.deriveKey(cryptoTest.password, cryptoTest.salt, cryptoTest.keySize, function(err, key) {
2013-06-10 17:07:29 -04:00
ok(!err);
equal(util.base642Str(key).length * 8, cryptoTest.keySize, 'Keysize ' + cryptoTest.keySize);
start();
});
});
2013-05-14 06:57:09 -04:00
asyncTest("AES/HMAC encrypt batch (Async/Worker)", 2, function() {
// generate test data
cryptoTest.symlist = testData.getEmailCollection(10);
2013-05-14 06:57:09 -04:00
crypto.symEncryptList(cryptoTest.symlist, function(err, result) {
ok(!err && result.key && result.list && result.list[0].hmac, 'Encrypt list for user');
equal(result.list.length, cryptoTest.symlist.length, 'Length of list');
cryptoTest.symEncryptedList = result.list;
cryptoTest.symKey = result.key;
start();
});
});
2013-05-14 06:57:09 -04:00
asyncTest("AES/HMAC decrypt batch (Async/Worker)", 3, function() {
var keys = [];
for (var i = 0; i < cryptoTest.symEncryptedList.length; i++) {
keys.push(cryptoTest.symKey);
}
crypto.symDecryptList(cryptoTest.symEncryptedList, keys, function(err, decryptedList) {
ok(!err && decryptedList, 'Decrypt list');
equal(decryptedList.length, cryptoTest.symlist.length, 'Length of list');
deepEqual(decryptedList, cryptoTest.symlist, 'Decrypted list is correct');
2013-06-10 17:07:29 -04:00
start();
2013-03-13 11:58:46 -04:00
});
2013-05-14 06:57:09 -04:00
});
2013-03-13 11:58:46 -04:00
2013-06-10 17:07:29 -04:00
asyncTest("AES/RSA encrypt batch for User (Async/Worker)", 2, function() {
// generate test data
cryptoTest.list = testData.getEmailCollection(10);
2013-05-14 06:57:09 -04:00
2013-06-10 17:07:29 -04:00
var receiverPubkeys = [cryptoTest.generatedKeypair.publicKey];
2013-06-10 17:07:29 -04:00
crypto.encryptListForUser(cryptoTest.list, receiverPubkeys, function(err, encryptedList) {
ok(!err && encryptedList, 'Encrypt list for user');
equal(encryptedList.length, cryptoTest.list.length, 'Length of list');
cryptoTest.encryptedList = encryptedList;
2013-05-14 06:57:09 -04:00
2013-06-10 17:07:29 -04:00
start();
});
});
2013-05-14 06:57:09 -04:00
2013-06-10 17:07:29 -04:00
asyncTest("AES/RSA decrypt batch for User (Async/Worker)", 3, function() {
2013-06-10 17:07:29 -04:00
var senderPubkeys = [cryptoTest.generatedKeypair.publicKey];
2013-06-10 17:07:29 -04:00
crypto.decryptListForUser(cryptoTest.encryptedList, senderPubkeys, function(err, decryptedList) {
ok(!err && decryptedList, 'Decrypt list');
equal(decryptedList.length, cryptoTest.list.length, 'Length of list');
deepEqual(decryptedList, cryptoTest.list, 'Decrypted list is correct');
2013-06-10 17:07:29 -04:00
start();
});
2013-05-14 06:57:09 -04:00
});
2013-06-10 17:07:29 -04:00
2013-03-13 11:58:46 -04:00
});